Research Article

Provably Secure Client-Server Key Management Scheme in 5G Networks

Table 4

Security comparison.

[32][33][34][35]Ours

K1 [33]
K2
K3
K4 [33]
K5
K6
K7 [33]
K8 [33]